
Case studies
These case studies show how military information technology can be used to support combat missions. For example, the cyber team of Sentar focuses on risk management framework support, policy development, and evidence collection for ATO/Risk Assessment efforts. TRANSCOM also uses a global Common Computing Environment, (CCE), which incorporates many applications to coordinate logistics requirements of deployed combat units.
The three case studies also illustrate the challenges and opportunities of CMI. For example, while some military performance requirements may create special technical demands, common technologies are often adequate to meet the needs of both the defense and commercial markets. A better planning process during the design phase can reduce differences between defense and commercial markets. Integration can be hindered by acquisition laws, and other legal restrictions.
Organizational identities
Lindsay claims that organizations can structure information processing by creating organizational identities. He points to the human operators who worked with early radar systems and the signature strikes used by drones today. Such systems are complicated and need to be simplified. These identities are often present in the technology used by military groups to fight wars.

Understanding the culture and values of military organizations is critical to the successful development of new technology. The culture of an organization is key to how new technologies are adopted. Different cultures are present in military organizations than in other organizations. These include hierarchy, rules, and discipline. This has an impact on the adoption of technology. Moreover, they differentiate between hot and cold environments, which affects how they implement new technology.
Complex information system architectures can have commonalities
It is important to understand the role of the "blocks " when looking at the overall architecture and functionality of a complex military computer system. The Defense Information Infrastructure is comprised of the long-haul and deployed unified command and management domains. These domains are connected to the Joint DII Control System which is responsible for operational integration as well as establishing an operating picture.
DoDAF is an example framework that has been widely used. It includes the Human Views as well as the Operational and System Views. This framework has been utilized in large-scale defence projects to share processes and produce work products. However, unlike the UK and US, Australia appears to lack a similar policy or a mechanism to share architectural information.
Systems that are user-designed
The Department of Defense is responsible for cybersecurity and military information technology. Both have responsibilities to protect the nation’s information and infrastructure. However, the Department of Defense has gaps in its current cyber defenses and must address them. User-designed systems are a powerful tool to do this.

The Department of Defense will integrate user-designed systems into new system development. This is a way to reduce the development time and expense, and improve the capability of military systems for providing mission-relevant info. This initiative is led by the Pentagon's Center for Defense Information Systems.